A New Distributed MIKEY Mode to Secure e-Health Applications

Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani


Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Internet KEYing) aims at establishing security credentials between two com- municating entities. However, the existing MIKEY modes fail to meet IoT specificities. In particular, the pre-shared key mode is energy efficient, but suffers from severe scalability issues. On the other hand, asymmetric modes such as the public key mode are scalable, but are highly resource consuming. To address this issue, we combine two previously proposed approaches to introduce a new distributed MIKEY mode. Indeed, relying on a cooperative approach, a set of third parties is used to discharge the constrained nodes from heavy computational operations. Doing so, the pre-shared mode is used in the constrained part of the network, while the public key mode is used in the unconstrained part of the network. Preliminary results show that our proposed mode is energy preserving whereas its security properties are kept safe.


  1. Abdmeziem, M. and Tandjaoui, D. (2015). An end-to-end secure key management protocol for e-health applications. Computers & Electrical Engineering.
  2. Abdmeziem, M. R. and Tandjaoui, D. (2014). Tailoring mikey-ticket to e-health applications in the context of internet of things. In International Conference on Advanced Networking, Distributed Systems and Applications, pages 72-77.
  3. Abdmeziem, M. R., Tandjaoui, D., and Romdhani, I. (2016). Architecting the internet of things: State of the art. In Robots and Sensor Clouds, pages 55-75. Springer International Publishing.
  4. Arkko, J., Lindholm, F., Naslund, M., and Norrman, K. (2004). Mikey: Multimedia internet keying. RFC 3830, IETF.
  5. Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer Networks, pages 2787- 2805.
  6. Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., and Rossi, M. (2012). Secure communication for smart iot objects: Protocol stacks, use cases and practical examples. In Proc. of IEEE WoWMoM.
  7. Chang, V. and Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services Computing, 9(1):138-151.
  8. Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P. H., Mantovani, J., and S. Modersheim, a. L. V. (2004). A high level protocol specification language for industrial security sensitive protocols. Proc. SAPS 04. Austrian Computer Society, 2004.
  9. Dohr, A., Modre-Opsrian, R., Drobics, M., Hayn, D., and Schreier, G. (2010). The internet of things for ambient assisted living. In Information Technology: New Generations (ITNG), pages 804-809.
  10. Dolev, D. and Yao, C. (1981). On the security of public key protocols. FOCS, IEEE, pages 350-357.
  11. Dworkin, M. (2007). Recommendation for block cipher modes of operation: The ccm mode for authentication and confidentiality. SP-800-38c, NIST, US department of commerce.
  12. Freeman, T., Housley, R., Malpani, A., Cooper, D., and Polk, W. (2007). Server-based certificate validation protocol(scvp). RFC 5055, IETF.
  13. Hui, J. and Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. RFC 6282, IETF.
  14. Hummen, R., Hiller, J., Henze, M., and Wehrle, K. (2013). Slimfit a hip dex compression layer for the ip-based internet of things. WiMob, IEEE, pages 259-266.
  15. Li, M. and Lou, W. (2010). Data security and privacy in wireless body area networks. Wireless Technologies for E-healthcare.
  16. Moedersheim, S. and Drielsma, P. (2003). Avispa project deliverable d6.2: Specification of the problems in the high-level specification language. http://www.avispaproject.org.
  17. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., and Roedig, U. (2011). Securing communication in 6lowpan with compressed ipsec. in Proc. of IEEE DCOSS.
  18. Raza, S., Trabalza, D., and Voigt, T. (2012a). 6lowpan compressed dtls for coap. in Proc. of IEEE DCOSS.
  19. Raza, S., Voigt, T., and Jutvik, V. (2012b). Lightweight ikev2: A key management solution for both compressed ipsec and ieee 802.15.4 security. IETF/IAB workshop on Smart Object Security.
  20. Reed, S. and Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300-304.
  21. Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and publickey cryptosystems. Communications of the ACM, 21(2):120-126.
  22. Roman, R., Alcaraz, C., Lopez, J., and Sklavos, N. (2011). key management systems for sensor networks in the context of internet of things. Computers and Electric Engineering, 37:147-159.
  23. Sahraoui, S. and Bilami, A. (2015). Efficient hip-based approach to ensure lightweight end-to-end security in the internet of things. Computer Networks, 91:26-45.
  24. Saied, Y. B. and Olivereau, A. (2012). Hip tiny exchange (tex): A distributed key exchange scheme for hipbased internet of things. in Proc. of ComNet.
  25. Tsiftes, N. and Dunkels, A. (2011). A database in every sensor. Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, pages 316-332.

Paper Citation

in Harvard Style

Abdmeziem M., Tandjaoui D. and Romdhani I. (2016). A New Distributed MIKEY Mode to Secure e-Health Applications . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD, ISBN 978-989-758-183-0, pages 88-95. DOI: 10.5220/0005945300880095

in Bibtex Style

author={Mohammed Riyadh Abdmeziem and Djamel Tandjaoui and Imed Romdhani},
title={A New Distributed MIKEY Mode to Secure e-Health Applications},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,},

in EndNote Style

JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,
TI - A New Distributed MIKEY Mode to Secure e-Health Applications
SN - 978-989-758-183-0
AU - Abdmeziem M.
AU - Tandjaoui D.
AU - Romdhani I.
PY - 2016
SP - 88
EP - 95
DO - 10.5220/0005945300880095